Identity Management Solutions

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
WatchGuard AuthPoint

AuthPoint Total Identity Security provides businesses with a solution to protect user accounts and credentials. With multi-factor authentication, password management, and dark web credential monitoring, AuthPoint mitigates the risks associated with workforce credential attacks.…

2
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

3
IBM Security Verify

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.

4
LastPass for Business

LastPass, a GoTo (formerly LogMeIn) company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing,…

5
SAP Customer Data Solutions

The SAP Customer Data Cloud, based on Gigya (acquired by SAP in 2017) is a product suite that allows users to identify consumers, business customers, or partners across devices and channels to drive registrations and engagement; manage access, permission, and consent; and transform…

All Products

(1-25 of 271)

1
WatchGuard AuthPoint

AuthPoint Total Identity Security provides businesses with a solution to protect user accounts and credentials. With multi-factor authentication, password management, and dark web credential monitoring, AuthPoint mitigates the risks associated with workforce credential attacks.…

2
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

3
LastPass for Business

LastPass, a GoTo (formerly LogMeIn) company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing,…

Explore recently added products

4
Microsoft Entra ID

Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls,…

5
SAP Customer Data Solutions

The SAP Customer Data Cloud, based on Gigya (acquired by SAP in 2017) is a product suite that allows users to identify consumers, business customers, or partners across devices and channels to drive registrations and engagement; manage access, permission, and consent; and transform…

6
1Password

AgileBits in Toronto offers 1Password, a password manager available to both private individuals and businesses, touting a unique approach to multi-factor authentication to improve security.

7
CyberArk Workforce Identity

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-…

8
IBM Security Verify

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.

9
OneLogin by One Identity

OneLogin is an identity and access management (IAM) product from One Identity since the October 2021 acquisition, featuring single sign-on (SSO), multi-factor authentication, provisioning, cloud directory, and more.

10
Dashlane

Dashlane is a password management solution designed to enable admins to easily onboard, offboard, and manage their employees with the assurance that company data is safe. And employees can enjoy a way to manage their work and personal accounts with a solution boasting millions of…

11
Keeper

Keeper's password security and management platform boasts millions of people and thousands of businesses as users, who manage, secure and enforce strong passwords across all employee logins, applications and sites. Employees can access Keeper natively on all mobile operating systems,…

12
SecurID

SecurID, a company and solution suite from RSA, is an identity and access management suite supporting access management, authentication, and identity governance.

13
IBM Cloud App ID

IBM Cloud App ID helps developers who are not security experts to add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud…

14
Amazon Cognito

Amazon Cognito is a mobile identity product that allows users to add user sign-up and sign-in to mobile and web apps, and authenticate users through social identity providers.

15
SailPoint Identity Platform

SailPoint Identity Security for the cloud enterprise manages risk from the explosion of technology access. The solution gives businesses visibility while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services.

16
SolarWinds Access Rights Manager (ARM)

SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has…

17
JumpCloud

JumpCloud Directory-as-a-Service® is a cloud-based platform that enables IT teams to securely manage user identities and connect them to resources they need regardless of provider, protocol, vendor, or location. Directory-as-a-Service gives organizations a single pane of glass to…

18
F5 BIG-IP Access Policy Manager (APM)

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

19
PingOne from Ping Identity

The PingOne Cloud Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning. The…

20
Delinea Secret Server

Secret Server (originally from Thycotic, now from Delinea since the 2021 Thycotic merger with Centrify) is an enterprise password management application, which is available with either a cloud-based or on-premise deployment which emphasizes fast deployment, scalability, and simplicity.…

21
Passly by ID Agent

Passly from ID Agent, a Kaseya company and the service that replaces the former AuthAnvil, is an identity and access management (IAM) platform providing two-factor authentication, single sign-on (SSO) and password management.

22
Avatier Identity Anywhere

The vendor aims to deliver seamless workforce access while maintaining security. Avatier Identity Anywhere is a passwordless IGA solution that includes: user self service and HR driven lifecycle management universal workflow experience with push notificationservice catalog with…

23
Oracle Cloud Infrastructure Identity Access Management (OCI IAM)

The Oracle Identity Cloud Service is a PaaS security and identity platform which provides hybrid identity features to maintain a single identity for each user across their on-premise and in the cloud services while delivering a seamless user experience.

24
ID.me

ID.me is a digital identity network that aims to simplify the user's indication verification experience.

25
Microsoft Entra External ID

Microsoft Entra External ID (formerly Azure Active Directory B2C, or alternately, Azure Active Directory External Identities) provides business-to-customer identity as a service. Customers can use their preferred social, enterprise, or local account identities to get single sign-…

Videos for Identity Management Solutions

The Evolution Of IAM (Identity Access Management)
03:07
We take a look at its history and evolution; from the origins of the first computer passwords in the 1960s to congressional oversight in the 21st century like the Sarbanes-Oxley Act.

Identity Management Solutions TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Learn More About Identity Management Solutions

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems)
  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server)
  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)
  • Password management and self-help for password users
  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access)
  • Directory / User Repository Management for tracking of users with access
  • Security Analytics for auditing and compliance

Challenges from Distributed Identity-Based Systems

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

The latest solution to managing distributed identity-based systems is Identity-as-a-Service (IDaaS). IDaaS is a cloud-based service offered by identity management vendors that outsources identity management to the vendor, especially in regards to access management for SaaS applications. In most cases, employees and other end users utilize Single Sign-On to access all of their business systems and applications. The vendor handles all of the identity management and authorization protocols on behalf of the business, saving the organization maintenance and overhead costs in the process.

Identity Centralization and Privileged Access Management

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Identity management solutions also enable businesses to utilize more granular privileged access management (PAM). Privileged access management ties users’ identities to specific privileges within different systems and applications. PAM capabilities limit the number of unnecessary access privileges that users have, minimizing the risk that comes with such excess privileges. Identity management software with PAM features, or standalone PAM products, also streamline privilege management for IT administrators, improving efficiency and security simultaneously.

Identity Management Solution Comparisons

There are some common factors to consider when comparing identity management solutions:

  1. Identity management suite vs. password management solution: Many identity management solutions started out as password management tools which then expanded into identity management. These products will likely excel at ease of use and integrations with popular 3rd party systems. In contrast, identity management suites with a legacy of identity management will likely be more robust for complex or large-scale identity management needs.
  2. User-focus vs. data security focus: same goals, but user-focus is more focused on making end-user’s identity management processes easier. In contrast, data security is more aligned with privileged access management, which prioritizes minimizing the attack surface of a business’s systems and data.
  3. SMB vs. Enterprise Users: Many identity management products skew towards either the SMB or the Enterprise markets. SMB-focused products will likely be easier to use with a greater focus on efficiency and self-service, while enterprise products will be more scalable and robust for IT administrators. Buyers can consider the distribution of reviews across SMB and enterprise reviews as a signpost of where a product may lie on this spectrum.

Start an identity management solution comparison

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Related Categories

Frequently Asked Questions

How does identity management software work?

Identity management software tracks users’ credentials and accounts in a central repository, enabling more centralization and security.

What’s the difference between identity management and privileged access management?

Identity management enables privileged access management by providing the system of record for user’s credentials and information. PAM then uses those credentials to assign specific privileges.

Does my business need identity management software?

A business should consider investing in identity management software if it leverages more than 1 or 2 protected systems with proprietary, sensitive, or business-critical data.

What are the benefits of an identity management system?

Identity management systems allow IT administrators to work more efficiently, saving time and money. They also improve business security, mitigating risks and potential breaches.

How much does identity management software cost?

Identity management software is most commonly priced per month, per user, up to $35/user/month for large deployments. Some vendors also offer specific features, like API access management or MFA, a la carte.